ChelleChelle writes “This article examines the limitations of the sockets API. The Internet and the networking world in general have changed in very significant ways since the sockets API was first developed in 1982, but the API has had the effect of narrowing the ways in which developers think about and write networked applications. This article discusses the history as well as the future of the sockets API, focusing on how ‘high bandwidth, low latency, and multihoming are driving the development of new alternatives.'”

r0nc0 writes “My company (a Fortune 15 company) has recently required everyone that accesses the company portal to accept or decline an ‘agreement’ that governs the use of social networking. It basically states that any discussion of the company or any of the work that you do, whether at the office or at home, must be governed by their rules of social networking. Naturally these rules are that you never say anything bad or negative about the company, nor do you say anything bad or negative about anything. It’s presented like a EULA, but if you decline more than 3 times your manager is notified. Naturally I declined it each time until my manager complained to me about all the email he was getting about me not accepting the agreement, so I went ahead and accepted, knowing that anybody who cares would just post anonymously anyway. This is the first time I’ve run into a forced agreement about social networking, and the agreement is so broad that it can’t possibly be enforced. I’ve tried pointing out that agreements like that only drive people away and aren’t necessary anyway, but I might as well talk to a brick wall. Has anyone else out there run into social networking behavioral agreements like this?”

NewYorkCountryLawyer writes “Last August I reported that the US Court of Appeals for the 2nd Circuit had defeated the MPAA’s attempt to label as copyright infringement a cable operator’s storing video for later reuse at the request of its subscribers, in Cartoon Networks v. CSC Holdings. The MPAA has petitioned the US Supreme Court to review that holding. According to a recent interview with Gigi Sohn of Public Knowledge, the High Court has not yet decided whether to grant the MPAA’s petition seeking review. What I found odd about the 2nd Circuit decision (PDF) is that (a) although ‘fair use’ was the most logical defense to be employed in view of the Supreme Court’s holding in SONY Betamax, upholding a VCR’s ‘time shifting’ of a broadcast television show as a ‘fair use,’ the defendant in Cartoon Networks has stipulated to waive ‘fair use,’ and (b) although the easier legal theory for plaintiff to prove would have been secondary, rather than primary, copyright infringement (i.e. Cablevision’s encouraging and inducing its customers to make unauthorized copies), the MPAA has stipulated to waive that line of attack. I.e. neither plaintiffs nor defendants seized the ‘low hanging fruit.’ In her interview, Ms. Sohn discusses the fair use defense, but I’m not sure why she does, since as I recall the defendant has waived it.”

Hugh Pickens writes “A team of Army cadets spent four days at West Point last week struggling around the clock to keep a computer network operating while hackers from the National Security Agency tried to infiltrate it with methods that an enemy might use. The NSA made the cadets’ task more difficult by planting viruses on some of the equipment, just as real-world hackers have done on millions of computers around the world. The competition was a final exam for computer science and information technology majors, who competed against teams from the Navy, Air Force, Coast Guard and Merchant Marine as well as the Naval Postgraduate Academy and the Air Force Institute of Technology. Ideally, the teams would be allowed to attack other schools’ networks while also defending their own but only the NSA, with its arsenal of waivers, loopholes, special authorizations is allowed to take down a US network. NSA tailored its attacks to be just ‘a little too hard for the strongest undergraduate team to deal with, so that we could distinguish the strongest teams from the weaker ones.’ The winning West Point team used Linux, instead of relying on proprietary products from big-name companies like Microsoft or Sun Microsystems.”

The complicated tango between the iPhone and AT&T’s network isn’t a new story, but the latest stats—web browsing eats 69 percent of phone bandwidth—highlight the fragility of networks, allowing fresh portents of doom.